Thursday, September 01, 2005

WindowsNetworking.com - Monthly Article Update

WindowsNetworking.com - Monthly Article Update

Hi Security World,

New articles and tutorials added to WindowsNetworking.com last month:

Title: Protecting EFS Encryption Keys
Author: Brien M. Posey
Summary: If you have mobile users in your organization, then implementing security can be especially challenging. You must secure the users’ laptops in such a way that if the laptops were lost or stolen that sensitive data would not be compromised. One way of accomplishing this task is by using the Encrypting File System (EFS). In this article, I will explain how to counteract some potential problems when using EFS.
Link: http://www.WindowsNetworking.com/articles_tutorials/Protecting-EFS-Encryption-Keys.html

Title: Understanding the ICMP Protocol (Part 2)
Author: Don Parker
Summary: In part one of the article we covered what the ICMP protocol actually was, and what it was used for. Further to that we also looked at one of the most common ICMP message types seen; the ping packet. This last part on ICMP will cover other various types of ICMP error messages that can commonly be seen traversing the Internet.
Link: http://www.WindowsNetworking.com/articles_tutorials/Understanding-ICMP-Protocol-Part2.html

Title: Using Pathping
Author: Robert J. Shimonski
Summary: One of my favorite Windows tools is pathping. Pathping is a Windows based command-line tool used to provide information about the path data takes to its intended destination, network latency and network loss at intermediate hops between a source and destination. We will cover what latency is as well as what hops are and so on within this article. We will also look at how to use pathping while trying to troubleshoot real world problems. This will help to reinforce the tool's usefulness and show you ways in which to use it when working on your own production networks.
Link: http://www.WindowsNetworking.com/articles_tutorials/Using-Pathping.html

Title: Understanding the ICMP Protocol (Part 1)
Author: Don Parker
Summary: Can you imagine a world where there are no traffic lights, stop signs, and other ways to control daily life? Well, just imagine what the Internet would be like then without the ICMP protocol. It would quickly become an unwieldy mess without it. In this article we will explore just what the ICMP protocol is, and how it works.
Link: http://www.WindowsNetworking.com/articles_tutorials/Understanding-ICMP-Protocol-Part1.html

Title: Wireless Networking - Your questions answered!
Author: Andrew Z. Tabona
Summary: This article is dedicated to answering a selection of the questions I received from WindowsNetworking.com readers by e-mail. Unfortunately I do not have time to answer all of your e-mails individually so I have decided to do so here in the form of an article for everyone's benefit. I have left out all the unnecessary information and just extracted the main points and the question itself, rather than the whole e-mail message.
Link: http://www.WindowsNetworking.com/articles_tutorials/Wireless-Networking-questions-answered.html

Title: Understanding the UDP Protocol
Author: Don Parker
Summary: When it comes to moving all that information across the Internet there is not only one choice when it comes to transport protocols. There are two. Namely, TCP and UDP. In this article we will look at the User Datagram Protocol, aka UDP.
Link: http://www.WindowsNetworking.com/articles_tutorials/Understanding-UDP-Protocol.html

Title: Determining the Functional Level in Windows Server 2003
Author: Robert J. Shimonski
Summary: In this article we will cover how to find out what your domain functional level is as well as why it’s important to understand. Whenever you deploy Windows Server 2003 in your production environment, you should always consider high level design items such as what your functional level is. This will determine what features you have available to you when you use Active Directory and Windows Server 2003. This article covers how to determine the level and how to change it if needed.
Link: http://www.WindowsNetworking.com/articles_tutorials/Determining-Functional-Level-Windows-Server-2003.html

Title: An Overview of Wireless Network Security
Author: Andrew Z. Tabona
Summary: In this article I will point out what sort of threats there are, give you some considerations when planning for the implementation of network security, and also a list of tips that will help to strengthen the security of your network.
Link: http://www.WindowsNetworking.com/articles_tutorials/Overview-Wireless-Network-Security.html

Title: Understanding the TCP/IP Protocol (Part 3)
Author: Don Parker
Summary: In part two we broke off analysis of the packet with the Win Size metric. In this final part we will cover the remaining metrics, as well as cover what all those hex values mean. Being able to understand what the hex values mean is also key to becoming a good network engineer.
Link: http://www.WindowsNetworking.com/articles_tutorials/Understanding-TCPIP-Protocol-Part3.html

Visit the Subscription Management (http://newsletter.isoftmarketing.com/) section to unsubscribe.
WindowsNetworking.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowsNetworking.com

Copyright © WindowsNetworking.com 2005. All rights reserved.

No comments:

Post a Comment